We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
Ensemble learning with output from multiple supervised and unsupervised models aims to improve the classification accuracy of supervised model ensemble by jointly considering the grouping results from unsupervised mod...
详细信息
ISBN:
(纸本)9781577355120
Ensemble learning with output from multiple supervised and unsupervised models aims to improve the classification accuracy of supervised model ensemble by jointly considering the grouping results from unsupervised models. In this paper we cast this ensemble task as an unconstrained probabilistic embedding problem. Specifically, we assume both objects and classes/clusters have latent coordinates without constraints in a D-dimensional Euclidean space, and consider the mapping from the embedded space into the space of results from supervised and unsupervised models as a probabilistic generative process. The prediction of an object is then determined by the distances between the object and the classes in the embedded space. A solution of this embedding can be obtained using the quasi-Newton method, resulting in the objects and classes/clusters with high co-occurrence weights being embedded close. We demonstrate the benefits of this unconstrained embedding method by three real applications.
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, devices will encounter high packet interference if many piconets are simultaneously operating in the same area. In this paper, we propose two schemes in the converged BTLE and cellular network, one is based on bad channel prediction for the BTLE piconets, and the other is based on frequency hopping sequences transformation. We compare the performance of the proposed algorithms with original scheme in the form of channel collision probability and new signaling overhead. The simulation results show that the proposed schemes can reduce channel collision probability significantly and simultaneously the new signaling overhead introduced to the downlink is not large.
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, ...
详细信息
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, Using the Contourlet transform, several polarimetric images can be decomposed into low-frequency coefficients and high-frequency coefficients with multi-scales and multi-directions. For the low-frequency coefficients, the average fusion method is used. For the each directional high frequency sub-band coefficients, the larger value of region variance information measurement is used to select the better coefficients for fusion. At last the fused image can be obtained by utilizing inverse transform for fused contourlet coefficients. Experimental results show that the proposed algorithm works better in preserving the edges and texture information compared with the traditional image fusion algorithms.
A hybrid strategy has been proposed to reduce the wrong clustering on Ambulatory ECG (electrocardiogram). Since Ambulatory ECG is usually composed by 24 hours data, the number of individual ECG waveform can reach to 1...
详细信息
Fisher's linear discriminant analysis (FLDA) is one of the most well-known linear subspace selection methods. However, FLDA suffers from the class separation problem. The projection to a subspace tends to merge cl...
详细信息
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher p...
详细信息
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher pulse energy and shorter pulse width in 40Gbit/s systems, self-phase modulation(SPM) is significant. The combined effect of GVD and SPM on the propagation pulses are analyzed through Nonlinear Schrödinger Equation(NLSE).
Recently, Gutierrez-Naranjo and Leporati considered performing basic arithmetic operations on a new class of bioinspired computing devices -- spiking neural P systems (for short, SN P systems). However, the binary enc...
详细信息
Recently, Gutierrez-Naranjo and Leporati considered performing basic arithmetic operations on a new class of bioinspired computing devices -- spiking neural P systems (for short, SN P systems). However, the binary encoding mechanism used in their research looks like the encoding approach in electronic circuits, instead of the style of spiking neurons (in usual SN P systems, information are encoded as the time interval between spikes). In this work, three SN P systems are constructed as adder, subtracter and multiplier, respectively. In these devices, a number is inputted to the system as the interval of time elapsed between two spikes received by input neuron, the result of a computation is the time between the moments when the output neuron spikes.
Rough set theory proposed by Pawlak, is a complementary generalization of classical set theory. The relations between rough sets and algebraic systems endowed with two binary operations such as rings, groups and semig...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collected from all points in the imaging grid, and this decreases the efficiency of the algorithm by summing over unnecessary grid points. In order to eliminate the disadvantage, the time-domain backprojection method based on finite beamwidth processing is proposed in the paper. The processing method is designed to be more physically realistic by accounting for the actual antenna pattern. Simulation results show that depending on the width of the effective beam, the number of processing loops can be reduced by up to 50%, while still maintaining good image quality in terms of the reconstructed target response.
暂无评论